Overview of Networking
Overview of Networking
• Objectives: to improve
throughput and
response time,
deadlines, waiting
time
Outline
• Introduction
• Data link layer: An overview
• Medium Access layer: An overview
• Network layer: An overview
• Transport layer: An overview
Networking
• Input: thousands of
computers connected
through communication Networking Applications
channels (http, sendmail,…)
Networking Protocols to
implement system calls with code
• Output is primitives to (Interface)
develop applications Tens of thousands of computers
and devices connected through
communication channels
• Objectives: to improve distributed across the world
throughput, reliability, (thousands of kilometers
and response time,
deadlines, waiting time
How it is different from producer and
consumer problem?
• Producer places an item and consumer consumes an item from the buffer.
• Normally in the same computer
• Producer waits if the buffer is full, consumer waits if buffer is empty.
• How to enable producer and consumer to exchange data, suppose a video if
• Producer is in one computer
• Consumer is another computer
• Issues
• Links might not be reliable
• All the data may not be delivered
• So, more mechanisms are needed.
• Requires
• Error control mechanisms
• Flow control mechanisms
Introduction
• Business applications
• Resource sharing
• To make programs,
equipment, and
data available to
anyone on the
network without
regard to the
location of the
user.
• Almost every
office requires
computer networks
Home
Applications
• Homes contain many networked
devices, e.g., computers, TVs,
connected to the Internet by cable,
DSL, wireless, etc.
• Home users communicate, e.g., social
networks, consume content, e.g.,
video, and transact, e.g., auctions
• Wikipedia, facebook, twitter, sms,
IP television
• Some application use the peer-to-
peer model in which there are no
fixed clients and servers:
In a peer-to-peer system there are no fixed
clients and servers.
Tag Full name Example
• Two dimensions
• Transmission technology
• Scale
• Two types of transmission technology
• Broadcast links
• Point to point links
• Point-to-Point links
• One sender and one receiver
• Connect individual pairs of links
• They may have to visit some intermediate machines.
• Broadcast link
• Communication link is shared by several machines
• A packet is received by all machines. The address in the packet
specified intended recipient.
• Broadcasting: message is sent to all machines
• Multicasting: message is sent to a subset of nodes.
Layered model
• Layered model
• Divide the roles/issues among
layers
• Develop each layer
• Lower layer provides services to
higher layer.
Protocol Layers
Protocol layering is the main structuring method used to
divide up network functionality.
Client Server
Recap:
• A layer provides a service to the one above
[vertical]
• A layer talks to its peer using a protocol
[horizontal]
Reference
Models
Reference models describe the layers in a network
architecture
Network
Link
Virtual data path
Sender
Receiver
MAC is in here!
Classic Ethernet (1) –
Physical Layer
One shared coaxial cable to which all hosts attached
• Up to 10 Mbps, with Manchester encoding
• Hosts ran the classic Ethernet protocol for access
Carrier Sense Multiple
Access (CSMA)
• CSMA (Carrier Sense Multiple Access) improves on ALOHA
by sensing the channel!
• User doesn’t send if it senses someone else
Ethernet
(DIX)
IEEE
802.3
Data Link Layer
Switching
Repeater, Hub, Bridge and switch
• Repeaters • Bridge
• They amplify signals • Connects two or more LANs
• A software in the bridge examines the
• Hub: It has several input lines and joins
electrically destination address and decides
where to send the frame
• Frames arriving on any of the line are
• With a bridge each line is a Collison
sent to all other lines
domain
• Two frames which arrive same time
• Switches
collide
• Similar to bridges
• Entire hub forms a single Collison
• Used to connect several individual
domain
computers
Uses of Bridges
Common setup is a building with centralized wiring
• Bridges (switches) are placed in or near wiring closets
Learning Bridges
A bridge operates as a switched LAN (not a hub)
• Computers, bridges, and hubs connect to its ports
Learning Bridges
(2)
Backward learning algorithm picks the output port:
• Associates source address on frame with input port
• Frame with destination address sent to learned port
• Unlearned destinations are sent to all other ports
Needs no configuration
• Forget unused addresses to allow changes
• Bandwidth efficient for two-way traffic
Learning Bridges
(3)
Bridges extend the Link layer:
• Use but don’t remove Ethernet header/addresses
• Do not inspect Network header
Repeaters, Hubs, Bridges, Switches,
Routers, & Gateways
• Network layer breaks it into packets and sends each of them to router A
using point-to-point protocol, PPP.
• ISP decides where to send packets. It has to take routing decisions.
• The algorithm which does routing decisions are called routing algorithm.
• H1 established connection 1 with host H2. The first line of A’s table says
that if a pack arrives with connection 1 it should be forwarded to C and
given connection id as 1.
• If H3 also wants to establish a connection to H2, it choses a connection
identifier 1 and tells the network to establish a connection.
(a)A network. (b)Input from A, I, H, K, and the new routing table for J.
Link State Routing
(1)
• Distance vector routing is replaced by link state routing.
• More computation but simpler dynamics
• Widely used in the Internet
Hierarchical routing.
Congestion Control
(1)
• Congestion is a situation: Too many packets present in the network
causes network delay and loss
• Both network and transport layers share the responsibility to control
congestion.
• Effective way is to reduce the load at the transport layer.
• Goodput (=useful packets) trails offered load
Congestion Control
(2)
• Network experiences a congestion collapse
• If routers will have infinite memory, congestion
gets worse
• Packets gets timed out.
• Difference between congestion control and flow
control
• Congestion control is related to whole network.
Involves the behavior of all the hosts and routers.
• Flow control relates to the traffic between a
particular sender and a particular receiver.
• Best method is to get host a “slow down”.
Congestion Control (3) –
Approaches
Network must do its best with the offered load
• Different approaches at different timescales
• Nodes should also reduce offered load (Transport)
Traffic-Aware
•
Routing
Choose routes depending on traffic, not just topology
• Link weight is a function of the link bandwidth, propagation delay,
measured load (average queuing delay)
• Routing tables are updated accordingly.
• E.g., use EI for West-to-East traffic if CF is loaded
• -ve: routing tables may oscillate wildly leading to erratic routing
and other problems
Admission
Control
• Idea: do not set up a new virtual circuit unless the
network can carry the added traffic without becoming
congested.
• Attempt to set up a virtual circuit may fail.
• Example: telephone system
• Issue is handling bursty traffic
• Video is easy to handle
• Traffic due to web browsing is very bursty
• Admission control can be combined with traffic ware
routing
• Redraw the network topology based on information
about congested routers.
• For example, normally connection between router A and B
passes through one of the congested routers. Based on the
information, we can redraw the network.
Traffic
• Throttling
When the congestion is imminent, network should tell the
senders to throttle back their transmissions and slow down.
• Congestion avoidance
• Congested routers signal hosts to slow down traffic for
Datagram networks and virtual circuit networks.
• Two problems have to be solved for each approach
• First: router must determine when congestion is
approaching, before it has arrived.
• Queuing delay captures congestion experienced by
packets
• Second: routers must send timely feedback to the senders
that are causing congestion.
• ECN (Explicit Congestion Notification) marks packets and
receiver returns signal to sender
Traffic Throttling: feedback
mechanisms
• Choke packets
• Router selects the congested packet and sends the choked packet back
to source host.
• When a source gets the choked packet, it is supposed to reduce the 50%
of traffic.
• Explicit congestion notification (ECN)
• The router can tag any packet it forwards to signal that it is experiencing a
congestion.
• When a network delivers a packet, the received can inform the sender
about congestion through ack. message. The design is called Explicit
Congestion Notification (ECN).
Load Shedding
•
(1)
When all else fails, network will drop packets
(shed load)
• When routers are being inundated by packets that
they can not handle, they just throw them away.
• Key question
• Which packets to drop?
• File transfer: old packet is important
• WINE policy
• Realtime traffic: new packet is important
• MILK policy
• Application must mark the importance on the
packets.
Load Shedding
(2)
• Random Early Detection
• Routers maintain a running average of queue length
ISP gives
network a
single prefix
Network divides it into subnets
internally
IP Addresses (3) –
Aggregation
Aggregation joins multiple IP prefixes into a single
larger prefix to reduce routing table size
ISP advertises
a single prefix
• Optimizations:
• First, leading zeros within a group can be omitted, so 0123 can be written as 123.
• Second, one or more groups of 16 zero bits can be replaced by a pair of colons.
• The above address now becomes 8000::123:4567:89AB:CDEF
• IPv4 addresses can be written as a pair of colons and an old dotted decimal
number
• Example
::192.31.20.46